Rainbow Rocks 10th Anniversary - Let's celebrate the 10th anniversary of Rainbow Rocks with an art event! Here
Interested in advertising on Derpibooru? Click here for information!
Champions of Equestria

Help fund the $15 daily operational cost of Derpibooru - support us financially!

Description

he changed your wifi password 😭 😭
commission for Crazy_Genetic

safe2226050 artist:midnightflight125 oc974716 oc only711649 oc:crazy_genetic5 cyborg5596 pony1655969 unicorn562575 semi-anthro23505 arm hooves17438 computer8447 cyberpunk2816 cyberpunk 2077253 digital art31027 error1631 glitch1317 horn219264 laptop computer3387 looking at you272385 solo1471131 text93557 unicorn oc33525

Comments

Syntax quick reference: **bold** *italic* ||hide text|| `code` __underline__ ~~strike~~ ^sup^ %sub%

Detailed syntax guide

Background Pony #AD06
@Background Pony #40DA
I was thinking the same thing, but I didn’t want to be too harsh with my criticism :p
The art’s very nice, no doubt about that… It’s just that as an IT professional I always tend to spot things like this and go “hmm.”
Posted Report
Background Pony #40DA
@Rennac
Whilst there s more “realism” in this picture then a myriad of other media with respect to a man in the middle attack, your comment is somewhat comparable to saying “a guy walks into a building” is something that happens during a bank robbery.
From the description, “changing your wifi password” is also typically not something you do with a man in the middle attack. Not sure how that would fit well in my analogy though; maybe ‘requested a new pin number’?
Posted Report
Background Pony #AD06
@Rennac
As someone who works in cybersecurity, you should probably have realized the terms were just describing a regular TCP connection and TLS handshake… Like the one that’s about to happen when I press “Post” on this comment.
Rennac
Lunar Supporter - Helped forge New Lunar Republic's freedom in the face of the Solar Empire's oppressive tyrannical regime (April Fools 2023).
Non-Fungible Trixie -

Honestly, as someone who works in cybersecurity, kudos. The terms are all pretty much applicable to what a man in the middle hacking attack would look like, or at least reasonably close given the different setting.
Posted Report